In a recent blog post, we discussed the millions of Americans who are currently struggling to recover after earthquakes, hurricanes, blizzards, fires, floods, mudslides and myriad other natural disasters that devastated residential and commercial properties across the country. Another category of disaster affecting millions, which also requires careful pre-planning and purposeful recovery, pertains to Information Technology (IT). As a prolific blogger, I wonder what we would do without IT? Continue reading “Information Technology Disaster Recovery”→

College Safety

Attending college is a grand adventure, whether students choose to live on campus or commute. I’ve never been to college but I would love to play Frisbee with some of the students. It also can prove risky for anyone who fails to sufficiently prepare for potential emergencies.

In our ongoing effort to save lives through training, the Allied Universal Fire Life Training System is expanding our online safety education to include residence hall fire life safety. Using building-specific information, students living in campus housing who attend subscribing universities will be able to log in to modules designed to train them to be safe, whether they live in a residence hall, traditional or suite-style residence, on or off campus. To help college students stay safe while attending college, we are doing a three-part blog series about campus safety.

Online Safety

In part one, we offered helpful tips for keeping students safe relative to fire. Part two focused on personal safety while in college. For this final entry, we cover college safety relative to cyber security. Despite my lack of opposable thumbs, I find this topic extremely timely.

Each year, college IT departments deal with hundreds or thousands of new and returning students who show up with laptops, desktops, smartphones and tablets—all of which need to connect to the campus network. This is a scary proposition where online security is concerned, so students should prepare to eliminate risks, both for their own safety as well as that of their college.

College Safety Online

Most college students today are infinitely more familiar with computer equipment than most of their parents and grandparents. JR has used Snapchat since he was a pup. Unfortunately, this familiarity can breed contempt, as most assume that cybercrime happens to other, less computer-savvy people. In fact, they are often referred to as “the click generation,” because they are so quick to click on website links and social media before considering the consequences. Another habit that puts them and their computers at risk is the sheer number of hours they spend online.

The Department of Homeland Security (DHS) has an aggressive cyber security branch, which focuses on cyberspace and its underlying infrastructure, both of which are vulnerable to a wide range of risk—stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. The DHS current cyber security campaign, Stop. Think. Connect encourages Internet users of all ages to take responsibility for their own cyber safety.

Keep a Clean Machine—Utilize malware software. Run regular security scans. Scan every device before inserting into a computer. Think twice before inserting an unknown flash drive into any computer. Not only should the source who provided the flash drive be trustworthy, but his or her cyber habits should be beyond reproach. This seems like common sense.

Protect Personal Info—Secure accounts with strong passwords. Change passwords often. Don’t write them on Post-it notes placed next to the machine. Set stringent security protocols on laptops, tablets, phones and desktop computers. Hackers and identity thieves can only access information provided over the Web. Stick to online activity that doesn’t require full name or contact information unless you are using a trusted site for online purchases, such as PayPal, eBay or and Amazon. Be skeptical of an unknown site that asks for email, credit card number or home address.

Connect with Care—Refrain from clicking hyperlinks sent in emails. Avoid doing anything of a personal nature while using a public hotspot. Make sure connections are secure (encrypted) whenever doing online banking or paying bills. And even while using a trusted social media platform, avoid revealing items of a personal nature such as school name, favorite hangout spot, and make/model of your car.

Be Web Wise—If something seems too good to be true, it probably is. Sounds like the free steak’ website I read about was a hoax. Students should think twice before ordering online from an unknown vendor. Trust your gut. Use only trusted websites. Keep abreast of known Internet threats. Think before typing or clicking.

Be a Good Online Citizen—Apply the *Golden Rule to everything done online and in person, too. Help fight cybercrime by reporting anything unusual to the Department of Homeland Security.

Students should also contact campus safety department and IT department for the best practices and tips recommended for their specific institution’s systems.

*Do unto others as you would have done to you.

Remember that safety in the 3D world, as well as cyberspace, is a priority for everyone all year long. A convenient and affordable way to make sure you are prepared for disasters and emergencies of virtually every kind is to subscribe to the Allied Universal Fire Life Training System, which has been designed to help improve and save lives. For more information about the best system out there, or to subscribe, click here.

Many thanks to our guest blogger, Mark McCourt of Allied Universal. To maintain the integrity of Mark’s post, we have refrained from our usual “firedog-isms.” Check back next week to read about disaster preparedness and emergency management from a firedog’s perspective.

The emergence of smart technology into the security sector is changing risk management economics and strategy in unique ways. Such technology leverages information management at its core for a more effective security program. Case in point is the burgeoning role of autonomous data machines (ADMs or robots) that are purposely built for security.

Will the advent of robots eliminate physical security officers at a site? Not any time soon, but robots are a real force multiplier by adding effectiveness and efficiency to security programs. The use of ADM technology augments security personnel by providing “smart eyes and ears” that enable security officers to manage information and communicate quickly and effectively.

Threats, crime and mischief do not operate on a timetable, nor do they sleep. Robots provide 24/7 autonomous patrolling and monitoring including autonomous recharging without human intervention, so that a company’s assets can be secure 24/7.

Hence, the new partnership formed this year between Allied Universal and Knightscope has brought this sophisticated technology to California clients and it is expected to be offered nationally in 2017.

The reasons to include robots in your security program include:

Force multiplier—More effective information sourcing and sharing, accessible in real time from the desk or on the run.

Monitoring, detection and alert capabilities—Human error is reduced with improved incident and response resolution time with analytics, information sharing and reporting capabilities.

Works with new platforms—A mobile app allows security officers to engage with the robots and use them as tools to cover more ground and do their jobs more effectively.

Leveraging robotic technology with manpower is the latest trend in asset protection. Blending the technology with people may prove to pay off for clients in the long run. It’s also a methodology more industries may soon tout as the new normal.

Thanksgiving is not only a time for expressing gratitude and enjoying family and friends, the holiday marks two of the busiest shopping opportunities in the U.S.—Black Friday and Cyber Monday. Follow these extra tips for a safe holiday and secure shopping experience.

Shop with known businesses; do your research about their past performances and financial stability.

Conduct transactions on a secure server only; look for the padlock device on the browser’s status bar. The URL should change from http to shttp or https when asked for payment information indicating that the purchase is encrypted or secure.

Do not record your social security or driver’s license number online, as it is not needed for purchases.

Have packages delivered to an address where they will not be left unattended.

March and April usher in several spring-time events: St. Patrick’s Day, Easter, and another annual American ritual — tax time! I’m so glad I don’t have to file taxes. It’s one of the benefits of being a dog. Unfortunately, tax season is prime time for cyber criminals to strike. The IRS expects more than 150 million individual returns to be filed this year, with four out of five returns (above 80 percent) to be filed electronically. Included within those returns are social security numbers, addresses, phone numbers, birthdates, and financial records for millions of Americans, which leaves the Internet teeming with highly confidential information.

According to a study done by a financial strategy company called Javelin, the total number of identity theft victims in 2015 was 13.1 million, totaling $15 billion. In its most recent report, the Federal Trade Commission (FTC) revealed that, in 2014, they received more than 2.58 million reports of consumer fraud. I wonder how many cats are involved in fraud. They seem pretty suspicious, to me! Among fraud complaints:

The average amount lost by alleged victims was approximately $2,000.

The median figure of loss was about $500.

In total, approximately $1.7 billion was lost by self-reported victims of fraud.

The most common methods of initial contact by fraud perpetrators was telephone (54%) and email (23%).

If you electronically file your taxes, here are some tips to help keep your data safe:

Vet the provider who electronically files your return. Authorized e-filers are registered on the IRS website at gov.

File your tax return ONLY on secure HTTPS sites. These encrypted sites will safeguard your information. So make sure a picture of a little lock appears in the website address field.

Beware of Wi-Fi hotspots. If you need to access a bank account while you are out, don’t use public Internet service. Cyber criminals can potentially intercept Internet connections while you are filing highly personal information. Don’t do anything relative to your taxes while using public Wi-Fi. Experian reports that seven percent of people do their taxes while logged into unsecured networks.

When in doubt, throw it out. Links in emails could direct your computer to malicious sites. If an email appears weird, even if you recognize the sender, delete it.

Carefully screen emails that appear to have come from your bank. If they do not contain your financial institution’s website domain name, immediately report the breach to your bank. And don’t forget to delete!

Shred documents that contain personal data. Doing so is worth the hassle, because many criminals dig through trash cans in search of sensitive information.

Don’t respond to emails claiming to be from the IRS. The IRS does not contact people by mail.

Never download documents from or click on links in tax-related emails. One click could unleash information-gathering malware on your computer.

Refrain from doing tax-related researching using your web browser. You could be lured to a malicious site.

This year, taxes must be filed by April 18, because Emancipation Day falls on the regular deadline of April 15. Nice that we get a few days of tax relief because of the holiday! So take the extra few days to make sure you are cyber safe. Remember that Internet safety is a daily priority, not just during tax season. So be sure to think about ways to #BeSafe all of the time. A convenient and affordable way to make sure you are prepared for disasters and emergencies of virtually every kind is to subscribe to the RJWestmore Training System by Universal Fire/Life Safety Services, which has been designed to help improve and save lives. For more information about the best system out there, or to subscribe, click here.

While we usually cover safety issues relative to incidents such as falls, earthquakes, or fire, the damages of failing to observe cybersecurity safety protocols, which — though life-threatening, can be equally devastating. Cybersecurity Awareness Month is observed in October, and is designed to raise awareness about the risks of electronic data and information breaches that can happen to individuals, companies and organizations. I guess I should consider myself lucky that my lack of opposable thumbs limits my ability to tweet. So it keeps my electronic risk at a minimum.

Last week, the focus of National Cyber Security Awareness Month 2015 was on the “smart world,” meaning all of the internet-connected devices that exist — from phones to thermostats. And here, I’ve always thought of “smart world” as contestants on the TV show, Jeopardy. This week, we focus on building the next generation of cybersecurity professionals, with an emphasis on promoting education and awareness to spark interest in the field. Education is essential for companies that want to protect their critical data from hackings and/or breaches.

Tips for Business Owners

Up to 95% of breaches are caused by human error. Notice that canines are not even mentioned. Whew! So, it is vitally important to train employees, first by giving them context, so they understand the consequences of data breaches and hacking incidents. Then, employers can guide them about best practices such as protecting passwords, carefully guarding data relative to outside agents, avoiding phishing scams, and adhering to data storage policies. Empower employees to alert management when something seems suspicious or odd or such as when someone from graphic design requests company financial data for something other than an infographic. Also, make sure staff members are careful not to post sticky notes with passwords on their monitors. I don’t use sticky notes, myself. They get stuck to my fur.

Additional best practices include:

Set automatic updates. Instruct IT to program automatic operating system and software updates, so the latest virus definitions and security protocols are always in place. Asking staff to perform these tasks manually opens you up to risks.

Establish login tracking. Login monitoring should be in place to spot external access attempts and identify employees who are accessing sensitive information or data outside their purview.

Set a security “fence” around sensitive data. I’m not usually a major fan of fences. But, in this case, they seem like a good idea. A company’s most important data (for example, personal customer information) should be protected behind a company firewall at all times. Restrict access to this data to a select few staff members. Also, make sure it is protected from potential download to personal devices or hard drives.

Tips for individuals to protect data and avoid cybersecurity issues:

Follow password procedures. Using “12345” or “password” for computer passwords is not recommended. Staff members should be trained about methods for selecting strong passwords and protecting sensitive documents.

Avoid storing data locally. News stories often recount employee losing laptops or thumb drives, with the device contents being used for illegal purposes. Discourage individuals from storing sensitive data directly on their devices. For greater security, instruct them, instead, to access data online. I guess that’s the mysterious “cloud” I keep hearing about? How safe can a cloud be for storing sensitive data?

Protect mobile devices. Employers increasingly allow employees to use their own devices to check email and access work data. Before approving this practice, instruct employees about methods for wiping their devices if they are lost or stolen. For maximum protection, establish and follow written “bring-your-own-device” procedures.

Don’t download unapproved software. Malware and other nasty computer bugs often reside in seemingly innocuous software. Beware of employees downloading free PDF-maker tools from the web. This software could be a launching pad for an attack. Staff should only download IT-approved software or apps to either their computer or mobile devices.

Don’t click on unknown links. Many businesses are targeted with official looking emails that provide an “important link.” Clicking on the link could infect the user’s computer, which can then travel throughout the employer’s network. Encourage employees to run suspicious emails by the IT department for a thorough review and safe deletion. Makes sense to me!

Remember that safety is a daily priority, so be sure to think about disaster planning all of the time. A convenient and affordable way to make sure you are prepared for disasters and emergencies of virtually every kind is to subscribe to the RJWestmore Training System by Universal Fire/Life Safety Services, which has been designed to help improve and save lives. For more information about our system, or to subscribe, click here.

In countless ways, technology improves our lives. Consider the expediency of mobile check deposits, security system monitoring, online shopping and bacon-related Smartphone apps! Unfortunately, many of the features we’ve come to appreciate, and even depend on, undermine our safety. Since October is National Cyber Security Awareness Month, we would like to remind our subscribers and friends to create a safe, secure and resilient cyber environment.

When the White House proclaimed October 2004 the first National Cyber Security Awareness Month, the Internet looked very different than it does today. Smartphones and social networks are just two of the electronic innovations of the last decade. Americans are communicating more frequently, with more people, and sharing more personal information than ever. As a result, cyber security threats and attacks are gaining momentum. With more than $525 million in losses due to online criminal activity in 2012, proper security measures are a critical component in keeping your identity and finances secure.

“Computers, Smartphones and other electronics have become a prevalent part of our daily lives,” said FEMA Region V Administrator Andrew Velasquez III. “Everyone needs to understand how frequently cybercrimes occur and arm themselves with the latest information and tools necessary to protect their families against potential fraud.”

Set strong passwords. Effective passwords have nothing to do with the users or family members’ names, birthdays, wedding anniversaries or addresses. This information is readily available. Try to come up with something that includes upper and lowercase letters, numbers and special characters in random order. And don’t write it down on a Post-it note next to your computer!

Change passwords regularly. To BE SAFE, come up with a new password for all of your logins once every 72 days. And don’t use the same password for every account! I used to use TheBaconator as my password. But I guess that would be easy to crack.

Don’t share your passwords with anyone. This one is difficult for me. I love to share!

Keep a clean machine. This includes making sure your operating system, browser, and security software are up to date. Don’t ignore the message to install updates. Oftentimes, these include critical virus protection. It’s difficult to keep my keyboard clean since I type and walk with the same paws.

Protect your personal information. Use privacy settings. This applies to your computer as well as your mobile phone. Although it is admittedly inconvenient to have to enter a password every time you want to access your cellphone, don’t sacrifice your security on the altar of convenience.

Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, delete or mark as junk email.

Get savvy about Wi-Fi hotspots. Limit the type of business you conduct and adjust the security settings on your device to limit who can access your machine. I prefer to use my own Smartphone as a personal hotspot instead of tapping into public networks.

Protect yourfinancial information.When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://” (which means the site takes extra measures to help secure your information. “http://” is not secure.)

Be cautious about online offers. This is particularly important as the holiday season approaches. If an offer sounds too good to be true, it probably is. Uh-oh. Does this mean the 100 lbs of bacon I ordered was a scam?

When a disaster strikes, prior planning and clear decisive action can help save lives. The RJWestmore Training System by Universal Fire/Life Safety Services is a convenient and affordable solution to all of the training needs of your building(s). Choosing our service cuts property management training related workloads by 90% and saves you over 50% compared to conventional training! More importantly, IT SAVES LIVES.

Since being founded in 2006, Twitter has evolved from a virtual gathering place teenagers casually discuss fashion and celebrity news to a 175,000,000-member platform used by law enforcement and emergency management professionals worldwide to share best practices and educate the public about disaster preparedness and recovery. Celebrating the medium, police agencies around the world will connect via Twitter on March 22 to participate in a 24-hour Tweet-a-thon beginning at 8 a.m. EST. I’ve had my own Twitter account since August 2009 and I find it’s a great way to communicate.

The Global Police Tweet-a-thon is sponsored by Cops.net. So far, 90 agencies have signed up to participate. And there is still plenty of time for interested parties to register. All that’s required to enter is submission of agency name, contact information and time zone. Just email the founder of LAWS Communications, lauri@lawscomm.net. All agencies will use the same hashtag, which is yet to be determined, in order to call attention to police work and issues that police officers face as well as promote the use of social media in police work. The hashtag I like most is #bacon.

“We hope to send (a message) to non-law enforcement that their police officers are up to speed with social media, and that they should use social media to talk with police officers and to be stewards of public safety,” explained event organizer Lauri Stevens.

Over the years, numerous police agencies have held tweet-a-thons or tweet-the-beat events to create awareness of police work and call attention to related issues. So far, early entries are from all across the United States as well as Canada and the UK. I’m trying to get all of my canine cohorts to sign up so we can communicate via the Tweet-a-Thon instead of through the Twilight Bark.

One state that understands the importance of relying on social media in times of crisis is Louisiana, where the Chief of Police in Thibodaux said he’s promoting transparency in policing actions and furthering proactive social media integration. A 2012 University of Maryland report called “Social Media Use during Disasters,” revealed detailed information about the public’s use of social media, both generally and during specific disasters, and addressed what prompts the public to use social media during disasters as well as what deters such consumption. The only thing that deters my consumption of bacon is a fully belly.

The report includes specific examples of social media consumption during key catastrophic events including 9/11, Hurricane Katrina and the 2010 Haitian earthquake. The case studies provide insights into how the public uses social media and other media, including preliminary lessons learned from these notable events. Most experts agree that if Hurricane Katrina had occurred after Twitter caught on, the exchange of information between victims and public agency officials likely would have been greatly improved.

Louisiana Police Chief Scott Silveri said his agency “will participate in the tweet-a-thon because (we) hope that other agencies break from the reactive isolationist nature of traditional law enforcement, and begin realizing the benefits of sharing timely and relevant information through social media.”

To participate in the Tweet-a-thon, email Lauri Stevens at lauri@lawscomm.net with agency name, contact name and email address. Then mark your calendar for March 22 and don’t forget to tweet! I’ll be tweeting and would love to start a conversation with you.

When a disaster strikes, prior planning and clear decisive action can help save lives. The RJWestmore Training System by Universal Fire/Life Safety Services helps commercial buildings with compliance to fire life safety codes. Our interactive, building-specific e-learning training system motivates and rewards tenants instantly! It’s a convenient and affordable solution to all of the training needs of your building(s). Choosing our service cuts property management training related workloads by 90% and saves you over 50% compared to conventional training! More importantly, IT SAVES LIVES!

This week, we continue our coverage about Smartphone security by focusing on the final five steps you should take to safeguard your cellphone. For the first five tips, check out our previous post. Most people guard their computers more carefully than their mobile phones. So a good rule of thumb is to treat your Smartphone as a very powerful mini-computer that makes phone calls. I suggest guarding your bacon with this same zeal.

Most Smartphone owners store lots of sensitive data. And chaos ensues if a thief gets his or her hands on the data. If you take steps to protect your phone, losing it will be a minor annoyance instead of a major catastrophe. Losing bacon, on the other hand, is always a major catastrophe.

When a hacker exploits an open Bluetooth connection, it’s called Bluejacking, Bluesnarfing or Bluebugging. I wonder if it’s related to bloodhounds biting. Sounds close to me. This type of hack requires intruders to be in close proximity to the phone they are hacking (within 30 feet of the device). But be aware that your Smartphone could be hacked via the active Bluetooth connection whenever you’re in a busy airport, hotel lobby, restaurant, hotel or dog park…to name a few hacker hotspots.

7. Make sure the free apps you download are actually free.

Some Apps that are labeled “free,” but are actually thinly-disguised data theft devices. Downloading one of these applications gives the app complete access to your phone. Thieves can use the app to steal data such as credit card and bank account info. What’s more, these apps can turn your phone into a launch pad which scammers use to attack other peoples’ data relative to SMS text messages and Smishing scams. Be smart and discreet about what you download. Read reviews first. And make sure the apps you download come from reliable sources. My favorite apps are Dog Park Finder, Map My Dog Walk, My Pet Ed, and Dog Translator.

8.Don’t store sensitive data.

Do you store passwords, pins, Social Security numbers, credit card or bank account information on your Smartphone? If so, delete it all today. Whether you have created a document expressly for this purpose, or sent yourself an email from your home computer, you should never store important information on your phone. Criminals are adept at detecting hidden information such as credit card numbers inside Contact notes or entered as phone numbers. Believe it or not, even if you try to disguise sensitive data, adept thieves will be able to crack the code. So make sure you delete all documents and emails containing sensitive information.

9. Clear browser histories.

Not clearing the browser history on your phone can be just as dangerous as staying logged into the website of your bank or your favorite online store. Phone thieves could use your browsing history to hijack accounts, steal your money and wreak havoc on your financial future. Here are links that walk you through deleting your history on an iPhone or an Android. My browsing history includes lots of websites about bacon and pork chops. I wouldn’t want an identity thief to get a hold of that!

10. When in doubt, purge it out.

You might be surprised by how many people fail to remove sensitive personal data from their Smartphones before exchanging, donating or selling it. The only way to entirely eliminate the data on your phone would be to physically shred the device. If this sounds a little severe to you, you may prefer securely deleting the data, which is relatively easy to do.

Your identity is your most important asset. So take precautionary steps to vigorously defend and protect it. When a disaster strikes, prior planning and clear decisive action can help save lives. The RJWestmore Training System by Universal Fire/Life Safety Services helps commercial buildings with compliance to fire life safety codes. Our interactive, building-specific e-learning training system motivates and rewards tenants instantly! It’s a convenient and affordable solution to all of the training needs of your building(s). Choosing our service cuts property management training related workloads by 90% and saves you over 50% compared to conventional training! More importantly, IT SAVES LIVES!